Lucene search

K
cve[email protected]CVE-2023-46648
HistoryDec 21, 2023 - 9:15 p.m.

CVE-2023-46648

2023-12-2121:15:09
CWE-331
web.nvd.nist.gov
7
github
ghes
vulnerability
brute force
nvd
cve-2023-46648

8.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

27.1%

An insufficient entropy vulnerability was identified in GitHub Enterprise Server (GHES) that allowed an attacker to brute force a user invitation to the GHES Management Console. To exploit this vulnerability, an attacker would need knowledge that a user invitation was pending. This vulnerability affected all versions of GitHub Enterprise Server since 3.8 and was fixed in version 3.8.12, 3.9.7, 3.10.4, and 3.11.1. This vulnerability was reported via the GitHub Bug Bounty program.

Affected configurations

Vulners
NVD
Node
githubenterprise_serverRange3.8.03.8.12
OR
githubenterprise_serverRange3.9.03.9.7
OR
githubenterprise_serverRange3.10.03.10.4
OR
githubenterprise_serverRange3.11.03.11.1
VendorProductVersionCPE
githubenterprise_server*cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
githubenterprise_server*cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
githubenterprise_server*cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*
githubenterprise_server*cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Enterprise Server",
    "vendor": "GitHub",
    "versions": [
      {
        "lessThan": "3.8.12",
        "status": "affected",
        "version": "3.8.0",
        "versionType": "semver"
      },
      {
        "lessThan": "3.9.7",
        "status": "affected",
        "version": "3.9.0",
        "versionType": "semver"
      },
      {
        "lessThan": "3.10.4",
        "status": "affected",
        "version": "3.10.0",
        "versionType": "semver"
      },
      {
        "lessThan": "3.11.1",
        "status": "affected",
        "version": "3.11.0",
        "versionType": "semver"
      }
    ]
  }
]

8.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

27.1%

Related for CVE-2023-46648